Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

2011

Institution
Keyword
Publication
Publication Type
File Type

Articles 391 - 405 of 405

Full-Text Articles in Computer Engineering

Neuro-Fuzzy Soft-Switching Hybrid Filter For Impulsive Noisy Environments, Şaban Özer, Hasan Zorlu Jan 2011

Neuro-Fuzzy Soft-Switching Hybrid Filter For Impulsive Noisy Environments, Şaban Özer, Hasan Zorlu

Turkish Journal of Electrical Engineering and Computer Sciences

In this study, a new soft-switching hybrid filter based on a neuro-fuzzy network for impulsive noisy environments is proposed. The hybrid filter was built by combining an adaptive finite impulse response (FIR) filter, an adaptive weighted myriad (WMy) filter, and a soft-switching mechanism based on a neuro-fuzzy (NF) network. Performance of the hybrid filter was tested in \alpha-stable noisy situations and compared with adaptive FIR, WMy, and weighted median (WMd) filter performances. According to the simulation results; the proposed hybrid filter has better performance than the adaptive FIR, WMy, and WMd filters, and has the ability of effectively suppressing the …


On The Existence Of Common Lyapunov Functions For Consensus Algorithms Based On Averaging, Mehmet Akar, Robert Shorten Jan 2011

On The Existence Of Common Lyapunov Functions For Consensus Algorithms Based On Averaging, Mehmet Akar, Robert Shorten

Turkish Journal of Electrical Engineering and Computer Sciences

This paper addresses distributed deterministic consensus algorithms based on averaging. We relate the conditions for achieving consensus to the existence of a common norm for a set of row-stochastic matrices associated with the original set of averaging matrices. For a system to achieve consensus, it is shown that this associated set of matrices should have a Common Lyapunov Function, even if the original set might not have one.


A Fuzzy Rule-Based System For Predicting The Live Weight Of Holstein Cows Whose Body Dimensions Were Determined By Image Analysis, Şaki̇r Taşdemi̇r, Abdullah Ürkmez, Şeref İnal Jan 2011

A Fuzzy Rule-Based System For Predicting The Live Weight Of Holstein Cows Whose Body Dimensions Were Determined By Image Analysis, Şaki̇r Taşdemi̇r, Abdullah Ürkmez, Şeref İnal

Turkish Journal of Electrical Engineering and Computer Sciences

The aim of this study was to determine the body measurement of Holstein cows through image analysis (IA) and to estimate their live weight (LW) by means of a fuzzy rule-based model using the body measurements. For this purpose, a photography environment was established at a dairy cattle farm where a large number of cows were kept. First, digital photographs of each animal were synchronously taken from different directions with Canon EOS 400D cameras. At the same time, body dimensions, namely wither height (WH), hip height (HH), body length (BL), and hip width (HW), of the cows were manually measured …


Delay-Dependent Stability Criteria For Interval Time-Varying Delay Systems With Nonuniform Delay Partitioning Approach, Mehmet Nur Alpaslan Parlakçi Jan 2011

Delay-Dependent Stability Criteria For Interval Time-Varying Delay Systems With Nonuniform Delay Partitioning Approach, Mehmet Nur Alpaslan Parlakçi

Turkish Journal of Electrical Engineering and Computer Sciences

This paper investigates the conservatism reduction of Lyapunov-Krasovskii based conditions for the stability of a class of interval time-varying delay systems. The main idea is based on the nonuniform decomposition of the integral terms of the Lyapunov-Krasovskii functional. The delay interval is decomposed into a finite number of nonuniform segments with some scaling parameters. Both differentiable delay case and nondifferentiable delay case and unknown delay derivative bound case are taken into consideration. Sufficient delay-dependent stability criteria are derived in terms of matrix inequalities. Two suboptimal delay fractionation schemes, namely, linearization with cone complementary technique and linearization under additional constraints are …


Self-Tuning Fuzzy Pd-Based Stiffness Controller Of A 3 \Times 3 Stewart Platform As A Man-Machine Interface, Vasfi̇ Emre Ömürlü, İbrahi̇m Yildiz Jan 2011

Self-Tuning Fuzzy Pd-Based Stiffness Controller Of A 3 \Times 3 Stewart Platform As A Man-Machine Interface, Vasfi̇ Emre Ömürlü, İbrahi̇m Yildiz

Turkish Journal of Electrical Engineering and Computer Sciences

Stewart Platform (SP) mechanism has wide application area on aerospace and manufacturing industry with its nonlinear structure allowing spatial motion capabilities. However, nonlinearities in the structure of the mechanism lead to complications in the dynamics of the system and result in complex control algorithms for dexterity in motion and force/torque feedback. Therefore, this paper aims to represent stiffness control by means of independent joint fuzzy-PD control algorithm with gain scheduling on an experimental 3 \times 3 SP parallel robotic mechanism to be used as a fly-by-wire flight control unit. Model and real system responses are compared employing stiffness control so …


Ua3/9/2 I.T. Division Annual Report + Tactical Plan, Wku Information Technology Jan 2011

Ua3/9/2 I.T. Division Annual Report + Tactical Plan, Wku Information Technology

WKU Archives Records

Annual report of WKU Information Technology Division submitted to WKU President Gary Ransdell. Report is housed in UA3/9/2 Subject Files.


Vehicular Ad Hoc Networks, Syed R. Rizvi, Stephan Olariu, Christina M. Oinotti, Shaharuddin Salleh, Mona E. Rizvi, Zainab Zaidi Jan 2011

Vehicular Ad Hoc Networks, Syed R. Rizvi, Stephan Olariu, Christina M. Oinotti, Shaharuddin Salleh, Mona E. Rizvi, Zainab Zaidi

Computer Science Faculty Publications

(First paragraph) Vehicular ad hoc networks (VANETs) have recently been proposed as one of the promising ad hoc networking techniques that can provide both drivers and passengers with a safe and enjoyable driving experience. VANETs can be used for many applications with vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications. In the United States, motor vehicle traffic crashes are the leading cause of death for all motorists between two and thirty-four years of age. In 2009, the National Highway Traffic Safety Administration (NHTSA) reported that 33,808 people were killed in motor vehicle traffic crashes. The US Department of Transportation (US-DOT) estimates that …


3-D Model Characterization And Identification From Intrinsic Landmarks, John L. Camp Jan 2011

3-D Model Characterization And Identification From Intrinsic Landmarks, John L. Camp

Browse all Theses and Dissertations

A method to automatically characterize and identify 3-D range scans based on intrinsic landmarks is presented. Intrinsic landmarks represent locally unique, intrinsic properties of a scanned surface, regardless of scale or rotation. The number, location, and characteristics of landmarks are used to characterize the scanned models. This method contains a selection process to identify stable, intrinsic landmarks for range scans as well as the identification of those scans. The selection process requires no user interaction or surface assumptions. It uses the principal curvatures at the range points to select the landmarks. First, a large number of landmarks are generated by …


Measuring Uncertainty Of Protein Secondary Structure, Alan Eugene Herner Jan 2011

Measuring Uncertainty Of Protein Secondary Structure, Alan Eugene Herner

Browse all Theses and Dissertations

This dissertation develops and demonstrates a method to measure the uncertainty of secondary structure of protein sequences using Shannon's information theory. This method is applied to a newly developed large dataset of chameleon sequences and to several protein hinges culled from the Hinge Atlas. The uncertainty of the central residue in each tripeptide is computed for each amino acid in a sequence using Cuff and Barton's CB513 as the reference set. It is shown that while secondary structure uncertainty is relatively high in chameleon regions [avg = 1.27 bits] it is relatively low in the regions 1-7 residues nearest a …


A User Centered Design And Prototype Of A Mobile Reading Device For The Visually Impaired, Robert B. Keefer Jan 2011

A User Centered Design And Prototype Of A Mobile Reading Device For The Visually Impaired, Robert B. Keefer

Browse all Theses and Dissertations

While mobile reading devices have been on the market and investigated by researchers in recent years, there is still work required to make these devices highly accessible to the visually impaired. A usability test with one such device revealed gaps in the current state of the art devices. These gaps focus mostly on the user interaction and his or her ability to quickly consume written reading material. In this dissertation a voice user interface (VUI) is presented that improves the ability of a blind user of a mobile reading device to interact with written material. The image processing techniques required …


A New Approach To Algebraic Coding Theory Through The Applications Of Soft Sets, Florentin Smarandache, Mumtaz Ali Jan 2011

A New Approach To Algebraic Coding Theory Through The Applications Of Soft Sets, Florentin Smarandache, Mumtaz Ali

Branch Mathematics and Statistics Faculty and Staff Publications

Algebraic codes play a signifcant role in the minimisation of data corruption which caused by defects such as inference, noise channel, crosstalk, and packet loss. In this paper, we introduce soft codes (soft linear codes) through the application of soft sets which is an approximated collection of codes. We also discuss several types of soft codes such as type-1 soft codes, complete soft codes etc. Further, we construct the soft generator matrix and soft parity check matrix for the soft linear codes. Moreover, we develop two techniques for the decoding of soft codes.


Mining Event Structures From Web Videos, Xiao Wu, Yi-Jie Lu, Qiang Peng, Chong-Wah Ngo Jan 2011

Mining Event Structures From Web Videos, Xiao Wu, Yi-Jie Lu, Qiang Peng, Chong-Wah Ngo

Research Collection School Of Computing and Information Systems

The article is discussing the issues of mining event structures from Web video search results using text analysis, burst detection, and clustering as with the proliferation of social media, the volume of Web videos have grown exponentially.


Design Of Multi Agent Based Crowd Injury Model, Emin Kugu Jan 2011

Design Of Multi Agent Based Crowd Injury Model, Emin Kugu

Electrical & Computer Engineering Theses & Dissertations

A major concern of many government agencies is to predict and control the behavior of crowds in different situations. Many times such gatherings are legal, legitimate, and peaceful. But there are times when they can turn violent, run out of control, result in material damages and even casualties. It then becomes the duty of governments to bring them under control using a variety of techniques, including non-lethal and lethal weapons, if necessary.

In order to aid decision makers on the course of action in crowd control, there are modeling and simulation tools that can provide guidelines by giving programmed rules …


Relativistic Red-Black Trees, Philip William Howard, Jonathan Walpole Jan 2011

Relativistic Red-Black Trees, Philip William Howard, Jonathan Walpole

Computer Science Faculty Publications and Presentations

Operating system performance and scalability on sharedmemory many-core systems depends critically on efficient access to shared data structures. Scalability has proven difficult to achieve for many data structures. In this paper we present a novel and highly scalable concurrent red-black tree. Red-black trees are widely used in operating systems, but typically exhibit poor scalability. Our red-black tree has linear read scalability, uncontended read performance that is at least 25% faster than other known approaches, and deterministic lookup times for a given tree size, making it suitable for realtime applications.


The Ordering Requirements Of Relativistic And Reader-Writer Locking Approaches To Shared Data Access, Philip William Howard, Josh Triplett, Jonathan Walpole, Paul E. Mckenney Jan 2011

The Ordering Requirements Of Relativistic And Reader-Writer Locking Approaches To Shared Data Access, Philip William Howard, Josh Triplett, Jonathan Walpole, Paul E. Mckenney

Computer Science Faculty Publications and Presentations

The semantics of reader-writer locks allow read-side concurrency. Unfortunately, the locking primitives serialize access to the lock variable to an extent that little or no concurrency is realized in practice for small critical sections. Relativistic programming is a methodology that also allows read- side concurrency. Relativistic programming uses dfferent ordering constraints than reader-writer locking. The different ordering constraints allow relativistic readers to proceed without synchronization so relativistic readers scale even for very short critical sections. In this paper we explore the diferences between the ordering constraints for reader-writer locking and relativistic programs. We show how and why the dfferent ordering …